5.8 Given a scenario, carry out data security and privacy practices Flashcards
Data Destruction and Media Sanitization
There are many different ways to dispose of and destroy data. All organizations should implement a data destruction and media sanitization policy to help IT professionals understand how they are to remove data from devices such as old hard drives and mobile devices.
Data Destruction and Media Sanitization - Burning
One simple way of destroying sensitive documents is by burning the documents.
Data Destruction and Media Sanitization - Shredding
You can shred documents to destroy sensitive information. Be sure to obtain a cross-cut shredder; a document cut into strips by a regular shredder can be easily be put back together. You can purchase a special type of shredder to destroy old hard drives.
Data Destruction and Media Sanitization - Pulping
You can pulp sensitive documents by using chemicals to break down the paper into a liquid/paste-like form.
Data Destruction and Media Sanitization - Pulverizing
Pulverizing destroys the old hard drive and reduces it to small particles.
Data Destruction and Media Sanitization - Degaussing
Degaussing is the process of removing the magnetic field from hard drives so that the data is lost.
Data Destruction and Media Sanitization - Purging
Purging data means permanently erasing data from the storage media, such as a hard drive
Data Destruction and Media Sanitization - Wiping
You can use programs to securely wipe a drive, which means overwriting the drive many times to ensure that the data cannot be retrieved.
Data Sensitivity Labeling and Handling
.
Data Sensitivity Labeling and Handling - Confidential
Government
The third-highest sensitivity label. Information classified as confidential could cause damage to national security if leaked to the public.
(1. Top Secret | 2. Secret | 3. Confidential | 4. Restricted | 5. Unclassified)
Business
The highest sensitivity label. Information classified as confidential could cause grave damage to the organization if leaked to the public.
(1. Confidential | 2. Private | 3. Sensitive | 4. Public)
Data Sensitivity Labeling and Handling - Private
The second-highest sensitivity label. Information classified as private could cause serious damage to the organization if leaked to the public.
(1. Confidential | 2. Private | 3. Sensitive | 4. Public)
Data Sensitivity Labeling and Handling - Public
Information assigned this classification label is suitable for public release.
(1. Confidential | 2. Private | 3. Sensitive | 4. Public)
Data Sensitivity Labeling and Handling - Proprietary
Another label that could be used to identify information as being private to the company, or internal, is proprietary. Proprietary information is information that is company owned and should not be shared outside the company without authorization.
Data Sensitivity Labeling and Handling - PII
Personally identifiable information (PII) Information that could identify a person.
Data Sensitivity Labeling and Handling - PHI
Protected health information (PHI) is health information about a patient, their care, health status, and the payment history that is protected by rules in the Health Insurance Portability and Accountability Act (HIPAA). Organizations will typically anonymize this information from the patient to maintain the privacy of the patient.